Worm Threat Forces Apple To Disable Software? 201
SkiifGeek writes "After the debacle that surrounded the announcement and non-disclosure of a worm that targets OS X, the vulnerability in mDNSResponder may have forced Apple to remove support for certain mDNSResponder capabilities with the recently released Security Update 2007-007. 'Seeming to closely follow the information disclosed by InfoSec Sellout, Apple's mDNSResponder update addresses a vulnerability that can be exploited by an attacker on the local network to gain a denial of service or arbitrary code execution condition. Apple goes on to identify that the vulnerability that they are addressing exists within the support for UPnP IGD... and that an attacker can exploit the vulnerability through simply sending a crafted network packet across the network. With the crafted network packet triggering a buffer overflow, it passes control of the vulnerable system to the attacker. Rather than patching the vulnerability and retaining the capability, Apple has completely disabled support for UPnP IGD (though there is no information about whether it is only a temporary disablement until vulnerabilities can be addressed).'"
*Pulls out a plate 'o crow* (Score:5, Funny)
Re: (Score:3, Funny)
Re: (Score:3, Informative)
I don't think the issue is the spec, it's the asinine cute features that M$ decided to implement. Like UPnP, BHO, etc etc. Maybe we should follow Apple's example, and eliminate all vulnerabilities by disabling the TCP/IP stack?
Re: (Score:2, Funny)
Re: (Score:2, Informative)
Problems with UPnP * UPnP uses HTTP over UDP (known as HTTPU and HTTPMU for unicast and multicast), even though this is not standardized and is specified only in an Internet-Draft that expired in 2001. [1] * UPnP does not have a lightweight authentication protocol, while the available security protocols are complex. As a result, many UPnP devices ship with UPnP turned off by default as a security measure.
Re: (Score:3, Informative)
Re: (Score:2)
Re:wait a minute (Score:5, Insightful)
In the modern world, there are simply too many protocols and systems popping up; no operating system exists in a vacuum, and many vulnerabilities may be in services, subsystems and so on. And with the pressure to get things out and shave off extra CPU cycles, there are too many situations where someone simply goes 'oh, well, I checked that this data is valid up HERE, so I don't need to check again down here in this function I call later,' and then later another piece of code goes, 'oh, look, here is a function that does what I need, I will just reuse it' and assumes that function does its own error-checking, so does not check the data before passing into it. And thus, you create a pathway where unvalidated data gets passed down and can cause buffer overflows or whatever.
No operating system or development team is somehow inherently immune to this.
The thing is that Windows not only has kept large chunks of legacy code -- which makes it hard to really break down and restrict user permissions without breaking older programs -- but spent some time really pushing the Active X technology, which then proved to create a lot of problems. Apple, on the other hand, went off the tracks entirely and threw out their operating system; that was a risky move which could have killed them off entirely, but in the end they got an operating system which was built atop a multi-user system with better permissions.
That does not mean that Apple somehow writes inherently better code than Microsoft; I happen to like OS X, but Apple's engineers are not necessarily smarter or more careful in the actual lines of code they write. The difference as I see it is that Microsoft is bogged down by hard-to-debug and support legacy code, while Apple got to make a cleaner start... and then on top of that, many bits of OS X (CUPS, zeroconf/Bonjour, WebKit, etc.) are open source.
Apple contributes funds and engineering to these projects (and in some cases such as zeroconf, came up with the original specifications), but as they are open source things tend to get found and fixed faster in community review. That is why OS X, while not bulletproof, tends to be at least a bit more secure than Windows.
That is my take on it, anyway.
Re: (Score:3, Informative)
Those days are also over (atleast for the most part). Windows now comes with its firewall on by default, and those wide op
Re:*Pulls out a plate 'o crow* (Score:4, Interesting)
I hope this indicates a return to sensibility at Apple. Lately they are trying so hard to be like MS, that the security has suffered. Can't turn off HTML in email is at the top of my security vulnerabilities.
Re: (Score:2)
News at 11... (Score:5, Insightful)
Yawn.
So UPnP means (Score:2)
Re: (Score:2, Informative)
mDNSResponder CVE-ID: CVE-2007-3744 Available for: Mac OS X v10.4.10, Mac OS X Server v10.4.10 Impact: An attacker on the local network may be able to cause a denial of service or arbitrary code execution Description: A buffer overflow vulnerability exists in the UPnP IGD (Internet Gateway Device Standardized Device Control Protocol) code used to create Port Mappings on home NAT gateways in the Mac OS X implementation of mDNSResponder. By sending a maliciously crafted packet, an attacker on the local network can trigger the overflow which may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue by removing UPnP IGD support. This issue does not affect systems prior to Mac OS X v10.4.
If one reads the entire note there were other, more noteworthy, bugs addressed rather than one that would take great care to craft and would have to be deployed on your LAN. Also, the derogatory terms used to refer to people who have an operating system preference are reminiscent of my three year old calling someone "poopie butt." Save us all.
Re: (Score:3, Insightful)
Here is a hint: A pretend army of supporters is still a pretend army.
Isn't it fascinating to watch as shitty comments (like we see above), vacillate back and forth between "+5 Insight
Re: (Score:2, Insightful)
I can think of a lot of phrases that would increase the signal to noise ratio (for me) if I could use them to exclude noise.
I believe a site mandated filter would be both useless and undemocratic.
configurable filter for slashdot (Score:2)
Mark as spam if message contains:
[x] fanboy/fanboi
[x] goatse
[x] 17 megabyte file
[ ] Kreskin
[x] Soviet Russia
[x] Profit!
[x] Beowulf
[x] I, for one
[x] hot grits
[ ] CowboyNeal
Re: (Score:2)
I can't believe you forgot the GNAA.
By the FSM's Noodly Appendage, those walls of text are annoying...
Re: (Score:2)
Isn't it fascinating to watch as shitty comments (like we see above), vacillate back and forth between "+5 Insightful" and "Flamebait" as the pretend army fights the good fight against Apple "FanBoiz" everywhere?
A pretend army that happens to have mod points. Interesting...
Re: (Score:2)
A pretend army that happens to have mod points. Interesting...
Mod points *are* pretend, or at least more pretend than the things they are modding.
He's specifically referring to (I gather) the "pretend war" that is going on over the modding of the comments, which are the "real war". This is especially interesting since modders can not (directly) participate in the discussion.
In a way, it's a lot like some sort of imaginary battle in the heavens in which gods are fighting to help their human followers on the battlefield.
Re: (Score:2)
Only a twelve year old would seriously think that saying someone is a "fanboy" is an effective retort to an informed argument that person is making.
I am not "hurt" by the fanboi language. The very idea is a sop to those who would use the term in that it positions the person so "hurt" as a bit of a fop themselves, (or gay, or female), all of which are the standard juvenile kind of associations that people who use the
New PC "language" (Score:2)
Re: (Score:2)
I modded you overrated but I prefer to reply to your post. Most /.s know what "leet speak" looks like. The poster you're referring to uses it with an obvious negative connotation, so it is clear he isn't endorsing it - rather he is accusing the researchers of acting as immaturely as teens who supposedly brag over themselves and use "leet speak".
If you can't understand that, at least type - and search - correctly. Had you Googled for "1337" instead of "1336", all the top hits would've shown you what was goi
Re:News at 11... (Score:5, Insightful)
The proof is in the number of successful worms and viruses for OS X, which depending on how you define them, hover right around zero. Yes, some of this is likely because of market share, but there's plenty of bragging rights associated with creating the first large-scale OS X compromise, so I wouldn't expect to see none. And of course, even if the relatively low number of security issues is because of market share, it doesn't make it any less pleasant for those of us who use OS X, especially since I'm not expecting it's share to go over 15-20%.
Anyway, if I accept your statement that OS X isn't perfect, will you stop bitching about smug mac users every time there is a discussion marginally related to Apple?
Thanks,
gutter
Re: (Score:2)
Re:News at 11... (Score:5, Insightful)
In other words, Ford Mustang owners tend to see Chevy Corvette owners as smug. Neither side is really willing to appreciate that each has advantages the other doesn't possess, and can't stand it when somebody highlights the advantage. That isn't ever going to change
I don't see how the situation is any different when an operating system is concerned, rather than a brand of vehicle.
Here's a news flash: OS X has advantages over Windows, Linux, and FreeBSD. OS X can brag about security, because there is a far smaller percentage of its users that have infected, compromised, or zombified machines. Ffind reasons to discount that fact is meaningless: It doesn't matter if the number of attackers is smaller; the goal is to not fall victim to an attack, which OS X has an excellent record of doing.
Here's another one: Macintoshes have disadvantages: They don't have as much native software. A virtualization product like VMware or Parallels is a rare sight on Windows, yet is quite common on a Macintosh. There's always some app that only exists for Windows that the user can't live without. So Mac users not only pay $130 for OS X, but also $80 for a virtualization product, and then they have to buy the most expensive license for Windows. Mac software doesn't enjoy the "freedom" that most Linux users enjoy; much of the software for the Mac is closed-source.
Still, you don't have to like it when OS X users dismiss the advantages of other OSes (like the amount of software for Windows, or the freeness of Linux).
Just take the time to realize that's it's a different flavor of the time-honored "Chevy vs Ford" debate. What is "better" depends on the way the beholder sees things, and it's childish to believe that there's only one true way.
Re: (Score:2)
For example: the fact that nobody has ever put a sniper bullet through a sheet of plastic wrap in the battlefield does not mean you should wrap your soldiers in it.
OS X may or may not be more secure than other systems, but that should be on the basis of something tangible, like good design, or security audits and not based on a lack of interest in attacking it.
Re: (Score:2)
If you aren't exploiting a vulnerability in a piece of software you
Re: (Score:2)
most of the studies I've seen measure the number of times some one tries to remotely contact your computer without your initiating in, so it's not surprising that when a bot trolls over your IP address it queries regaurdless of OS... that doesn't mean it's a bot which tries to open a mac os X hole.
now those types of attacks are probably 100% windows oriented. if your attack has to be completely automated to try
Re: (Score:2)
I think you missed the point: Even if we assume that you are right, this doesn't really matter. To the normal user, it makes no difference whether he was not infected by a virus because the security is better, or whether he was not infected by a virus because the market share is lower. In either case, he was not infected by a virus.
You are right, of course, when you say that this should not mean
Re: (Score:2)
Standard Operating Procedure? (Score:2)
Re:Standard Operating Procedure? (Score:5, Interesting)
1. Implement it to Microsoft's spec.
2. Implement it correctly (by choosing a direction in places the spec contradicts itself or real implementations).
3. Implement it securely.
Choose only one.
I do not think it is possible to implement UPnP securely and have it based on the spec. Also, the specific code they removed existed only for legacy NAT traversals and may not even be needed any more.
Re:Standard Operating Procedure? (Score:4, Informative)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re:Standard Operating Procedure? (Score:5, Interesting)
Can you show me an implementation of UPnP that hasn't had bugs? According to wikipedia [wikipedia.org] security is a problem with the spec itself. It's getting so bad that some major router manufacturers are disabling the routing of UPnP packets by default on their non-consumer (and a few consumer) networking appliances.
And my list was more of a dig at OOXML rather than being security related.
Um, so ? (Score:5, Insightful)
I'm guessing there's a regular scheduled security update process in Apple. If you can't fix it in time for the next patch-release, isn't is *better* to temporarily disable it ? I really doubt it's a permanent removal of the feature - they're just being responsible.
Simon.
ITS A LIE (Score:3, Funny)
Re: (Score:3, Funny)
OT but... (Score:2, Informative)
Yes, Apple is made up of many people; but my car is made up of many parts. You don't say "my car need gas" do you?
This perplexes me, can someone explain it? Sorry if it's completely OT (except that this (to me) error is in the blurb).
-mcgre
Re: (Score:3, Informative)
If you prefer, consider mentally replacing "Apple" with "the people who work at Apple"...
Simon
Re: (Score:2)
Cheers.
Re: (Score:2)
Recommended reading [thecorporation.com].
Re: (Score:2)
You remind me of the soulless boogers that treat the word "data" as plural ("The data are coming from the internet").
Re: (Score:2)
it hearkens back to the day when a company was just that, a company. nowadays, the most important thing about a company is that it is a legal entity, not that it consists of people. but i shouldn't get started on that...
Re: (Score:2)
Re: (Score:2)
Just so -- now tell it to the British Council. ;-)
Re: (Score:2)
Just because in the US you have this strange idea that companies are only one person (maybe all the employees cease to be individuals when they work there?) don't try to convince the rest of the world of it.
Apple ... Worm (Score:5, Funny)
Re: (Score:2)
Hmmm... (Score:3, Interesting)
http://developer.apple.com/opensource/internet/bo
Is Apple the developer of mDNSResponder or are they just using it?
Re:Hmmm... (Score:5, Informative)
mDNSResponder originated from Apple.
Re: (Score:2)
Re: (Score:2)
Sensationalism by Zonk (Score:5, Insightful)
The blog has been corroborated (Score:2)
Shouldn't this be optional? (Score:2)
At least they disabled it! (Score:4, Interesting)
But at least they decided that it's better to disable the feature and minimize the damage to the net as a whole (and yes, even if you don't have an Apple, a worm damages you by clogging your tubes with packets trying to spread itself). MS decided that it's better to keep the insecure service up and running 'til it can be addressed.
Question for 100: Still getting sober/blaster packets? I do.
Re: (Score:3, Insightful)
Re: (Score:2)
My guess is that it was simply more convenient to do NOTHING. And this security hole (and disabling it) is far from a product-crippling effect that you describe. More accurately, it would be a bug in Office's Thesaurus and disabling it. Yes, it would inconvenience some people, but it's far from crippling the product into uselessness.
Re: (Score:3, Informative)
Outlook was plagued by viruses and Microsoft responded by releasing a patch that simply refused to allow the user to open certain types of attachments. There was no override in the original version of the patch.
http://www.slipstick.com/outlook/esecup.htm [slipstick.com]
When Exchange 5.5 was targeted by reverse-NDR spam attacks Microsoft shipped a patch that allowed the user to simply turn off non-delivery reports. Unfortunately the patch didn't work as described on many
Re: (Score:2)
Re: (Score:2)
Microsoft has done pretty much that... (Score:2)
Apple didn't disable Bonjour, they disabled one of the components of Bonjour. That's not like disabling loading, it's like refusing to load certain files.
There was a bug that allowed autoexec macros in MS Word documents being loaded by Office 97 to result in security issues, so Microsoft responded by making i
Re: (Score:2)
Apple approach better in all cases (Score:2)
Consumers: Computer is patched En Masse, network as a whole is protected.
Company: Would note that vulnerability disables something they use, so they simply would not deploy the patch. Companies have control over Microsoft patches unless they are very small, and if they are that small they are probably not go
Re: (Score:2)
Next... Open Safe Files? (Score:2)
Re: (Score:2)
Re: (Score:2)
The majority of threats and exploits on Windows are based on user stupidity, coupled with exploits in third party programs. Now, IE isn't really a third party program, but its weak security is a key entry point for exploits. MPack relies heavily on IE security holes (which are STILL unfixed in 7.0, btw...), as do many
Apple did the right thing (Score:5, Insightful)
A) Pick a feature that's dumb. (like embed a scripting language into an image format, or give a spreadsheet scripting language access to the filesystem)
B) Choose to preserve the dumb feature in spite of known security problems.
C) Treat the resulting backlash as a "PR issue" rather than a technical one.
D) Sometimes, if the backlash gets bad enough, they'll hack in security restrictions in response to specific known implementations that take advantage of the vulnerability rather than fix the vulnerability. EG: fixes that look for a XXX worm trace, rather than fix the thing that XXX worm exploits. (See anti-virus [wikipedia.org])
Apple is doing the right thing, here, folks! It may or may not be that the feature mentioned is analogous to (A) above. Either way, Apple is chosing security over features, even though features are important.
Re: (Score:3, Interesting)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Have you been paying attention? (Score:2)
Leaving out a module? It's questionable whether they should be trying to hack some kind of limited uPnP compatibility into Zeroconf in the first place, especially if (as alleged) they're using it for "legacy NAT traversal"... this just screams "bad idea" to me.
They brag about how little they know compared to what it takes to keep a Windows machine happy
They brag about how little they NEED TO KNOW com
"additional validation" or "disabled support" (Score:3, Interesting)
Clearly something is unclear since iChat is obviously still using UPnP IGD, likely as a client?
But why is the mDNSResponder using UPnP IGP anyway? mDNS is for service discovery etc and is basically a competitor to UPnP (I thought). Perhaps there is a way for mDNSResponder to leverage UPnP IGP to broadcast service messages (e.g. bonjour) across a local NAT? If so I've never seen nor heard of this working -- so perhaps what they're disabling is vulnerable code that wasn't doing anything anyway?
Re: (Score:2)
My guess is that since Apple decided to unilaterally disable the feature (without giving any option to activate it for the mighty or protected folks) it is because it was probably never used.
Who wants to bet... (Score:3, Interesting)
I bet there's a secret cabal at Microsoft that is working on this very thing.
Now that Apple has disabled uPnP compatibility.... (Score:3, Interesting)
Re:Now that Apple has disabled uPnP compatibility. (Score:2)
Big Loss! (Score:3, Informative)
Re: (Score:2)
mDNS is Multicast DNS, an standard for resolving host names collaboratively on a local subnet using APIs similar to standard server/unicast DNS. It is half of what Apple calls Bonjour.
DNS-SD is DNS Service Discovery, which allows devices with shared services to advertise themselves on a local network.
Together, they provide much of the simple "just works" networking that AppleTalk delivered in 1986: devices discover each other and auto configure without any c
Re: (Score:2)
Actually they're not just working on it it's live.. if you have a server that provide a service it can register with the global mdns responder and be available worldwide.
It's the kind of thing that DNS SRV records are designed for (and rarely got used for) except you don't ha
Re: (Score:3, Insightful)
You can give yourself points for knowing unrelated details about Microsoft's non-standard, security challenged architecture. The number of devices using UPNP as anything other than a way to play games over a router are really insignificant however.
The wikipedia article you linked to points out:
- UPnP uses HTTP over UDP (known as HTTPU and HTTPMU for unicast and
Apple should have stayed vulnerable (Score:2)
Knee-jerk PC fanboi: "Oh, I guess Apple isn't so secure after all, huh?"
Mac-fanboi: "Umm, they fixed a problem with some 3rd-party software before it became an issue."
Knee-jerk PC fanboi: "Yeah, old Apple finally getting some of what Windows gets."
Mac-fanboi: "No, they proactively fixed the problem"
Knee-jerk PC fanboi: "Yep, might as well just use Windows"
Mac-fanboi: "You do that, then."
Re: (Score:2)
Here is a page with instructions about how to remove it (read the full thread; the first post has an error):
http://www.x64bit.net/site/board/index.php?showtop ic=4214 [x64bit.net]
Re: (Score:2)
Re: (Score:2)
Re:Does anyone use mDNS? (Score:4, Insightful)
UPNP - Microsoft
Apple have disabled the Microsoft protocol. Won't affect them in the slightest I'd expect.
mDNS is actually fairly useful.. you can advertise servers across the network using it, and it's an easy protocol to implement (a few hundred lines of code will do it).
UPNP is an XML infested mess with a huge spec that I wouldn't try to implement unless I had a deathwish. And in all that mess they forgot to add any user or machine verification.. the upshot being if you enable it on a router you can disable its firewall with a 10 line perl script.
Re: (Score:2)
Moderations tell all (Score:2, Troll)
Re: (Score:2)
I think it has more to do with the 'Macs don't get viruses.' ads we see every now and then
And they fucking don't. What's wrong with that? Macs DON'T GET VIRUSES. There were some for OS 9, but there are none (beyond a few "proofs-of-concept") for OS X. NONE.
That doesn't mean viruses are impossible, nor that they will never come, just that they haven't yet.
Linux/*BSD get their fair share of worms, but also have legions of nerdy fanboys to fix vulnerabilities, and no one important foolishly calls them impenetrable.
No one calls OS X impenetrable either. Strange how you jump from viruses to worms, btw.
OS X is very much like Linux, and very much unlike Windows, where with the former, you know the potential almost certainly exists for your machine to be hac
Re: (Score:2)
[a]I never said anything was wrong with that; just that it's [b]stupid to use it as a selling point, when it's [c]primarily due to their low market share.
[b] contradicts [a] and [c] is an unproved assertion.
To expand, if there's nothing wrong with the fact that there are no viruses for OS X, why is it stupid to promote that fact? As for assertion [c], OS X has a larger market share than Linux, yet there exist actual Linux viruses.
Funny, I could have sworn that's [viruses] what the article was about.
The article is about a worm *threat* from a worm that *doesn't exist* beyond the (claimed) system of a security researcher. Ignoring the conflation of virus and worm, I covered this when I excepted "proofs-of-concept".
A worm is a virus that propagates over a network
No, it's no
Re:Moderations tell all (Score:4, Informative)
"OS X is every bit as crash prone and unreliable as Windows" (It's crash prone, but not "every bit as crash prone")
"not so with Apple, which radically changes their OS every few years" (Two points here: 1. if this is true, it belies your following statement 2. it's not true)
"There is no inherently superior security in OS X" (the overall design and implementation of OS X is more secure than the overall design and implementation of XP. Vista is a vast improvement over XP, but it remains to be seen how this works out)
"those people who blame Microsoft for vendor lock-in" (straw man, no one claims this)
"OS X is the ultimate in vendor lock-in" (OS X is an extremely open system. The only "lock-in" is with their hardware, which really isn't that big of a deal.)
There are people who get fanatical about Macs, but you're lumping a whole lot of rational people in with them, and fully deserve flaimbait or troll modding for it.
Not to mention the fact that both you, and the OP are both (at present) modded positively, which makes your cries of being oppressed a bit silly.
Re: (Score:2)
yes, they did [fail] unless you consider near-Bankruptcy success
They were never near bankruptcy, and even if they were, that does not mean they failed (although I'd agree that that would have been a good sign of potential failure). They were definitely on a trajectory for failure in the mid-90s, but they were nowhere near *actual* failure. Ever.
"OS X is every bit as crash prone and unreliable as Windows" (It's crash prone, but not "every bit as crash prone")
Give it time[a]. Defects per line of code[b] in their software are probably[c] sitting around average for the OS industry. This is statistically provable[d].
Ok, this was so absolutely non sequitur, I had to add what I wrote to provide context.
[a] What does time have to do with it? Are all the crashes just building up in preparation for a crash deluge?
[b] Defects do not necessarily
Re:TV add (Score:4, Funny)
"And I'm a PC. Hey Mac, I heard you don't get viruses. Congratulations."
*PC Shakes Mac's hand*
"That's right, PC. But I do have worms."
*PC starts wiping hand furiously*
Re: (Score:2)
But Apple fans shudder at anything remotely resemble brand dilution.